AI data security starts with controlling access to your crown jewels

In the AI era, if you don’t control the keys, you don’t control the data. Here’s why that matters.

Krista Case  profile picture
Krista Case

January 29, 20263 min read

This is a stylized image showing AI Data security with a lock surrounded by keys.

Recent events have reinforced a foundational truth of modern data security: data privacy is only as strong as the systems that control access to encryption keys.

A clear example came to light in January, when reporting revealed that Microsoft provided the FBI with BitLocker recovery keys, allowing law enforcement to unlock data that users believed was fully encrypted and private. The keys were accessible because users had agreed to automatically back it up to the cloud provider’s environment by default – a design choice optimized for convenience, not customer sovereignty.

This moment is particularly relevant during International Data Privacy Week, a global reminder that protecting sensitive data is not just a regulatory obligation, but a trust imperative. As organizations reflect on how they collect, access, and protect data an important question emerges:

Who controls the keys to your most valuable data assets?

Convenience vs. control

The Microsoft BitLocker case is not about wrongdoing or misconfiguration. It is about architectural control.

BitLocker encryption worked exactly as designed. However, because they stored recovery keys in a provider-managed cloud environment, Microsoft was technically and legally able to comply with a warrant by providing access to those keys. As reported by Forbes, this meant the FBI could unlock encrypted data without the customer’s direct involvement.

This illustrates a broader issue affecting many modern platforms:

  • Encryption keys may be automatically escrowed, without explicit customer intent
  • Providers can be compelled to provide third-party access car, not the data owner
  • Compliance workflows may prioritize provider obligations over customer control

For enterprises, the takeaway is simple: if your cloud provider can access your encryption keys, your data is never fully under your control.

With AI data security, expanded access equals expanded risk

Encryption keys centralized within provider-managed infrastructure, expand the blast radius of access dramatically. Even when strong safeguards exist, cloud-stored keys introduce additional access paths that organizations do not directly govern.

This risk becomes even more pronounced in environments where:

  • AI agents routinely access sensitive datasets
  • Machine identities outnumber human users
  • Enterprise AI security depends on precise, enforceable access boundaries

Without strong AI data security, AI access control, and AI governance security, organizations risk unintentionally extending trust to systems and providers that were never meant to hold it.

Customer-controlled key models are becoming the standard

It is imperative that forward-looking security programs treat encryption keys as true crown jewels. Rather than defaulting to provider-managed models, such organizations are prioritizing architectures that preserve control by design:

  • Bring Your Own Key (BYOK): Customers manage keys while platforms enforce policy
  • Hold Your Own Key (HYOK): Providers cannot access keys at all
  • Client-side encryption: Keys never leave customer-controlled environments

These models ensure that even under subpoena or legal request, third parties cannot decrypt sensitive data without explicit customer participation – a critical requirement for modern AI risk management, regulatory compliance, and audit readiness.

Trust is an architectural decision

The Microsoft BitLocker case serves as a market-wide learning moment:
Trust is not a feature; it is an architectural decision.

Organizations that prioritize data privacy, governance, and enterprise resilience are moving away from silent defaults and toward intentional control models. They demand transparency, enforce least privilege access, and retain authority over who, or what, can unlock their data.

As International Data Privacy Week reminds us, enterprises cannot define privacy by encryption alone. It is defined by who controls access when it matters most. Learn more about how OpenText can help protect your crucial data.

Share this post

Share this post to x. Share to linkedin. Mail to
Krista Case avatar image

Krista Case

Krista Case leads product marketing for the OpenText™ Data Security portfolio, driving global go-to-market strategy across solutions that help enterprises discover, protect, and manage sensitive data everywhere it lives. With a focus on unified data security, AI-driven visibility, and compliance at scale, Krista translates complex security challenges into business outcomes – empowering CISOs and data leaders to reduce risk and unlock the value of trusted data. Having spent more than 15 years as a cybersecurity industry analyst prior to joining OpenText, Krista is grounded in deep market insight and strategic perspective.

See all posts

More from the author

Data security’s next chapter: from siloed controls to a unified growth engine

Data security’s next chapter: from siloed controls to a unified growth engine

Enterprises are racing to modernize multi-hybrid cloud infrastructures and to operationalize AI. The result: data volume, velocity, and value are exploding. But so is risk….

November 17, 2025

4 min read

The AWS outage: A wake-up call for cyber resilience

The AWS outage: A wake-up call for cyber resilience

Cyber-attacks dominate headlines, but the October 20, 2025, AWS service disruption is a stark reminder that all forms of IT and cloud service outages can…

October 30, 2025

3 min read

Stay in the loop!

Receive regular insights, updates, and resources—right in your inbox.